The Winnowing
Gherbod Fleming
Nemesis Rulebook
nemisis
AcrE1A.tmp
Unknown
book_of_nod.pdf
Applied Cryptography, Second Edition
Bruce Schneier
The Art of Attack
Maxie Reynolds
The Art of Deception
Kevin D. Mitnick & William L. Simon
The Art of Intrusion
Simon, William L. - Mitnick, Kevin D.
The Art of Memory Forensics
Michael Hale Ligh & Andrew Case & Jamie Levy & AAron Walters
Cryptography Apocalypse
Roger A. Grimes
Cryptography Engineering: Design Principles and Practical Applications
Niels Ferguson & Bruce Schneier & Tadayoshi Kohno
Cybersecurity and Third-Party Risk
Gregory C. Rasner
Cybersecurity Blue Team Toolkit
Nadean H. Tanner
Hacking Multifactor Authentication
Investigating Cryptocurrencies
Nick Furneaux
Kali Linux Penetration Testing Bible
Gus Khawaja
Liars and Outliers
The Liquidsoap book
Samuel Mimram; Romain Beauxis
Malware Analyst's Cookbook and DVD
Michael Ligh & Steven Adair & Blake Hartstein & Matthew Richard
The Pentester Blueprint
Phillip L. Wylie & Kim Crawley
The pfSense Book
Netgate
Practical Reverse Engineering
Bruce Dang & Alexandre Gazet & Elias Bachaalany
Quick Start Guide
John Schember
README
Social Engineering
Christopher Hadnagy
thecarhackershand[..]
Threat Modeling
Adam Shostack
Transformational Security Awareness
Perry Carpenter
Tribe of Hackers
Marcus J. Carey & Jennifer Jin
Tribe of Hackers Blue Team
Tribe of Hackers Red Team
Tribe of Hackers Security Leaders
Unauthorised Access
Allsopp , Wil
The Web Application Hacker’s Handbook
Dafydd Stuttard & Marcus Pinto
Windows PowerShell Tutorial for Beginners
netwrix
Wireshark for Security Professionals
Jessey Bullock & Jeff T. Parker